Biographical information for identifying the identity of the person to whom it relates
POPULARITY
The DNS resolution path by which the world's internet content consumers locate the world's internet content producers has been under continuous attack since the earliest days of Internet commercialization and privatization. Much work has recently and is currently being invested to protect this vital source of Personally Identifiable Information -- but by whom, and why, and how? Let's discuss. About the speaker: Paul Vixie serves AWS Security as Deputy CISO, VP & Distinguished Engineer after a 29-year career as the founder and CEO of five startup companies covering the fields of DNS, anti-spam, Internet exchange, Internet carriage and hosting, and Internet security. Vixie earned his Ph.D. in Computer Science from Keio University in 2011 and was inducted into the Internet Hall of Fame in 2014. He has authored or co-authored several Internet RFC documents and open source software projects including Cron and BIND. https://en.wikipedia.org/wiki/Paul_Vixie
Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society. In anticipation of Data Privacy week (January 25th‒28th, 2023), Justin Smulison is joined by Fred E. Karlinsky and Travis Wong to discuss all things cybersecurity and data privacy. Joining in the first half of the podcast is Fred E. Karlinsky, a shareholder and Co-Chair of the Insurance Regulatory & Transactions Practice at the Florida law firm, Greenberg Traurig. Fred is also a member of the RIMS External Affairs Committee and will be one of the panelists joining the RIMS External Affairs webinar on January 5th titled, “How Cyber Insurance is Shaping the Insurance Industry.” In his conversation with Justin Smulison, he provides an overview of the webinar and discusses how cyber and risk management trends are overlapping this year and in 2023. Travis Wong, the VP of Risk Engineering and Security Services at Resilience Insurance, joins the podcast in the second half to offer a deeper perspective on data privacy topics against the backdrop of current events. He lends his expertise on cyber security trends, the FTX collapse, and organizations that are at risk for data breaches, and shares his advice on what organizations can do to better protect their remote employees. Key Takeaways: [:01] About the RIMS Membership. [:14] Registration for RISKWORLD 2023 is now open! [:33] About RIMScast. [:50] About today's episode! [1:00] All about upcoming RIMS webinars, workshops, events, and more! [1:53] About “RIMS Letter to Federal Insurance Office Supports the Development of a Cyber Insurance Backstop.” [2:27] Justin introduces today's first guest, Fred E. Karlinsky. [3:11] Justin welcomes Fred to the podcast. [3:36] What can risk managers learn from the FTX collapse? [4:50] What “RIMS Letter to Federal Insurance Office Supports the Development of a Cyber Insurance Backstop” details and why it is important. [6:15] Fred shares some updates from the RIMS External Affairs Committee. [8:03] What to expect from RIMS External Affairs' upcoming webinar, “How Cyber Insurance is Shaping the Insurance Industry.” [10:27] Justin thanks Fred for joining the podcast! [11:15] RIMS Plug time! All about upcoming workshops and webinars. [12:10] One Hot Minute with Scott Fenstermaker to discuss the upcoming webinar: “Royal Caribbean Group Creatively Uses RMIS to Boost Wellness.” [14:31] Justin introduces and welcomes Travis Wong to the podcast! [15:19] About Travis' career and his role as VP of Risk Engineering and Security Services. [15:48] Trends in cyber security and privacy breaches that Travis has witnessed in 2021‒22. [17:11] The industries that threat actors mainly target. [18:34] Has the FTX collapse changed the way that threat actors view crypto? [19:50] How did public or private organizations demonstrate cyber resiliency in 2022? [22:04] How can businesses ensure that they have formal and efficient processes in place to comply with CCPA and GDPR transparency requests? [24:40] Travis' tips and advice for organizations on protecting remote employees. [28:08] Justin thanks his guests for joining the podcast and shares some links to check in today's show notes. Mentioned in this Episode: RIMS Letter to Federal Insurance Office Supports the Development of a Cyber Insurance Backstop From Risk Management Magazine: “Insurance Coverage For Jackware Attacks,” by Daniel J. Healy & Robert M. Horkovich “Preparing for New U.S. Data Privacy Laws,” by Ben Richmond “4 Principles to Improve Your Data Privacy Program,” by Ray Pathak RIMS Events, Education, and Services: RISKWORLD 2023 — April 30‒May 3 in Atlanta, Georgia! Member registration is now open! RIMS Risk Maturity Model RIMS Events App Apple | Google Play NEW FOR MEMBERS! RIMS Mobile App RIMS Buyers Guide Contribute to RIMS Risk Management magazine Dan Kugler Risk Manager on Campus Grant Sponsor RIMScast: Contact sales@rims.org or pd@rims.org for more information. Upcoming Webinars: “Protect Against Machinery Breakdown and Supply Chain Delays” | Sponsored by TÜV SÜD GRC | Dec. 8, 2022 “Royal Caribbean Group Creatively Uses RMIS to Boost Wellness” | Sponsored by Riskonnect | Dec. 13, 2022 RIMS External Affairs Presents: “How Cyber Insurance is Shaping the Insurance Industry” | Jan. 5, 2023 “Recertification: Keep Your RIMS-CRMP Active” | Complimentary to All | Jan. 9, 2023 “What to Expect from Cyber Insurance in 2023 and Beyond” | Sponsored by Telos | Jan. 24, 2023 Virtual Workshops: “Contractual Risk Transfer” — Dec. 7‒8 | 9:30 am‒3:30 pm EST | Registration Closes Dec. 6th — Register Now! “Managing Cognitive Bias Risk” — Dec. 7‒8 | 9:30 am‒3:30 pm EST | Registration Closes Dec 6th — SAVE $100! Use Code: MCBR100 See the full calendar of RIMS Virtual Workshops Related RIMScast Episodes: “RIMS Advocacy — See You In September” (2022) “CERT-In Cyber Details to Know with Jyoti Krishnan” “2022 Midyear Risk Review with RIMS Publications Director Morgan O' Rourke” “Getting to Know Jackware with Dan Healy of Anderson Kill” “Cloud Security Risks with Google's Monica Shokrai” “Roadway Risks: AI, Autonomous Vehicles, & Automated Driving” “Ransomware Risks and ‘Responding Gracefully' with Masha Sedova” “Cyber Breach Responses with Kate Fazzini, Flore Albo CEO” “The World of Cybersecurity with NCSA's Kelvin Coleman” “Cybersecurity Frameworks with NIST Fellow, Ron Ross” “Cyber Risk News & Trends with Tony Anscombe” “Cyber Risk News & Trends with Tony Anscombe, Part 2” “Cybersecurity in a COVID-19 World with Luke Wilson” “Cybersecurity Tips for Small Businesses with Daniel Eliot” “Cybersecurity with Christopher Loeber” “The State of Cybersecurity and 5G Technology with Jason Ruger, Ruby Zefo, and Chris Novak” Sponsored RIMScast Episodes: “Zurich's Construction Sustainability Outlook for 2023” (New) “Aon's 2022 Atlantic Hurricane Season Overview” “ESG Through the Risk Lens” | Sponsored by Riskonnect “A Look at the Cyber Insurance Market” | Sponsored by AXA XL “How to Reduce Lithium-Ion Battery Fire Risks” | Sponsored by TÜV SÜD “Managing Global Geopolitical Risk in 2022 and Beyond” | Sponsored by AXA XL “Keeping Subcontractors Safe Through Partner Elevation” | Sponsored by Highwire “ESG: A Responsibility and a Growing Megatrend” | Sponsored by Prudent Insurance Brokers Ltd. “Prioritizing People: Focusing on Your Team to Deliver Exceptional Quality and Service to Your Clients” | Sponsored by Gallagher Bassett “Bermuda Opportunities in 2022 with BDA Chair Stephen Weinstein” | Sponsored by Bermuda Business Development Agency “SyncR: A Tool to Enhance Your Risk Quality & Insurance Strategy” | Sponsored by Prudent Insurance Brokers Ltd. “RIMScast: Navigating the Risk Landscape in 2022” | Sponsored by AXA XL “RIMScast: Prioritizing People: Expertise and Innovation” | Sponsored by Gallagher Bassett “RIMScast: Risk Findings for the Industrial & Manufacturing Industry” | Sponsored by Aon “RIMScast: Establishing the Right Assurance to Request From Business Partners” | Sponsored by HITRUST “RIMScast: Aon's 2021 Retail Industry Overview” | Sponsored by Aon “RIMScast: A Legacy of Resilience” | Sponsored by J.B. Boda Group “The Golden Era of Insurance” | Sponsored by The Hartford “Insurance Investigation Trends Happening Now” | Sponsored by Travelers “What Could a CRO Do for Your Business?” | Sponsored by Riskonnect “Hard Reality: A Look at Rising Rates in Property & Excess Casualty” | Sponsored by AXA XL “Property Valuation Deep Dive” | Sponsored by TÜV SÜD “Property Loss Control Engineering” | Sponsored by Prudent Insurance Brokers RIMS Publications, Content, and Links: RIMS Membership — Whether you are a new member or need to transition, be a part of the global risk management community! RIMS Virtual Workshops Upcoming RIMS — Virtual WorkshopsIMS Webinars On-Demand Webinars RIMS Advisory Services — Ask a Peer Risk Management Magazine Risk Management Monitor RIMS Risk Leaders Series RIMS-Certified Risk Management Professional (RIMS-CRMP) RIMS-CRMP Stories — New interview featuring RIMS-CRMP Chairman Ward Ching! Spencer Educational Foundation RIMS DEI Council RIMS Path to the Boardroom Want to Learn More? Keep up with the podcast on RIMS.org and listen on iTunes. Have a question or suggestion? Email: Content@rims.org. Join the Conversation! Follow @RIMSorg on Facebook, Twitter, and LinkedIn. Follow up with Our Guests: Fred E. Karlinsky's LinkedIn Scott Fenstermaker's Website Travis Wong's LinkedIn Resilience Insurance Tweetables (For Social Media Use): “At the end of the day, the fundamentals stay the same. You need to prepare. If you fail to prepare, prepare to fail.” — Fred E. Karlinsky “What I think is going on in the world we live in today when we think about risks [is that] cyber risks are probably the ones that are the most prevalent. They affect all of us.” — Fred E. Karlinsky “I would say … over the last year or so, government entities and technology companies in particular [are targets for cyberattacks]. Those companies with a lot of PII or Personally Identifiable Information … have been significantly hit.” — Travis Wong “The first thing I would tell clients is: ‘Please understand what you have.' You need to inventory your data; you need to manage it. You can't protect what you don't know exists. You can't provide transparency to consumers if you don't know you have it somewhere.” — Travis Wong “Ensure you have a solid foundation. Know where your key data is, know who has access to it, and know what type of data that actually is. Inventorying it is one thing, classifying it is something else.” — Travis Wong
Why does it take four months for a breach to be disclosed? Software is not the answer a competent Chief Security Officer is. Camilla Harris ‘22
This week Dave (https://dgshow.org/hosts/dave) and Gunnar (https://dgshow.org/hosts/gunnar) talk about clever uses of malware, cows, virtual reality, augmented reality, cryptocurrency, and the Denver Broncos (not all at the same time) Keychain garage door openers (https://www.lowes.com/pd/Chamberlain-Universal-2-Button-Keychain-Garage-Door-Opener-Remote/1000133147): they're great! How to See Your Uber Passenger Ratings Breakdown (and Improve Your Score) (https://lifehacker.com/how-to-see-your-uber-passenger-ratings-breakdown-and-i-1848547158) How to Download Everything Amazon Knows About You (It's a Lot) (https://lifehacker.com/how-to-download-everything-amazon-knows-about-you-its-1848412242) Dave endorsed: Grammarly Premium (https://www.grammarly.com/premium) iOS malware can fake iPhone shut downs to snoop on camera, microphone (https://www.bleepingcomputer.com/news/security/ios-malware-can-fake-iphone-shut-downs-to-snoop-on-camera-microphone/) Farmer gives cows VR headsets to reduce anxiety and increase milk production (https://metro.co.uk/2022/01/07/farmer-gives-cooped-up-cows-vr-headsets-to-increase-milk-production-15880604/) These crypto enthusiasts are trying to raise $4 billion to buy the Denver Broncos (https://www.cnbc.com/2022/02/19/-buythebroncos-dao-aims-to-raise-4-billion-to-buy-denver-broncos.html) BuyTheBroncos (https://www.buythebroncos.com/) Who owns your address in AR? Probably not you. (https://www.protocol.com/entertainment/upland-augmented-reality-real-estate) Superworld (https://www.superworldapp.com/) Cutting Room Floor * This Clever Device Detects the Amount of Metal in Music (https://www.hackster.io/news/this-clever-device-detects-the-amount-of-metal-in-music-d08509982627) * Atlas Missile Silo for Sale, Cheap (https://homesandhues.com/p/atlas-missile-silo-for-sale-cheap) ($380K) * Zeebo – Honest Placebo Pills Designed to Help You Create a Safe Experience on Your Path to Well-Being (https://www.amazon.com/Zeebo-Placebo-Designed-Experience-Well-being/dp/B00NUKW26M) We Give Thanks * The D&G Show Slack Clubhouse for the discussion topics!
Malibu Hills Treatment Center Review (Podcast) https://www.worldsbest.rehab/malibu-hills-treatment-center/ https://www.worldsbest.rehab/es/malibu-hills-treatment-center/ Malibu Hills Treatment Center was opened in 2010 with the mission to help clients suffering from addiction and co-occurring disorders. Situated in the hills of southern California near the Pacific Ocean coastline, Malibu Hills Treatment Center has worked with thousands of clients over the years. The rehab offers clients a five-star luxury treatment experience. The treatment center provides clients with a 30-day program that can be extended if further rehabilitation is needed. You will find a variety of treatment programs that fit into your needs. Malibu Hills has a non-12-step treatment philosophy. The rehab's gorgeous location between the mountains of southern California and the Pacific Ocean provides you with the perfect setting to heal. If you are struggling with drug and alcohol addiction along with co-occurring mental health issues, Malibu Hills can help. The center offers clinical expertise to clients and individualized care. Evidence-based therapies are provided giving you the chance to heal using cognitive behavioral therapy, one-on-one therapy, and eye movement desensitization and reprocessing. Malibu Hills Treatment Center also provides you with a number of holistic therapies such as equine assisted therapy, acupuncture, reiki therapy, and meditation and mindfulness therapy. Malibu Hill offers you an unbeatable atmosphere. Your rehab experience will feel more like a holiday away from home. This gives you the chance to recover, heal, and end the issues you are experiencing. The rehab comes with luxurious outside space that overlooks the Pacific Ocean. Malibu Hills is secluded, giving you the chance to stay away from the issues outside the center's doors. The intensive luxury rehab program at Malibu Hills Treatment Center is second to none. What is a day like at Malibu Hills Treatment Center? Days begin at Malibu Hills with a few options. You can either choose to work out in the rehab's offsite fitness center or using the fitness machines provided onsite. There is also the option to complete yoga practice twice per week. You will undergo individual therapy twice a week and group therapy sessions take place daily. Therapy sessions typically begin at 11 am and finish around 5 pm. Clients break for lunch in between giving them the chance to eat nutritious meals. Clients suffering from drug and/or alcohol disorders with co-occurring mental health issues are the focus of Malibu Hills. The center works with clients suffering from a range of drug dependency issues, including heroin, methamphetamines, oxycontin, and other drugs. If detox is needed, you are provided an around the clock nurse and a medical doctor is on call to oversee it. Medication is given when needed to clients going through detox. All medication is given at low levels. Malibu Hills provides an individualized program to clients, allowing each resident to get the treatment specifically needed to recover. The 30-day treatment program begins following detox. Once the program begins, you will undergo cognitive behavioral therapy and/or dialectical behavior therapy. Malibu Hills focuses on holistic treatment to help residents overcome their drug, alcohol, and mental health issues. Malibu Hills Accommodation Malibu Hills has two gorgeous co-ed villas. The rehab provides space for up to 12 clients at a time. Each private villa offers up six bedrooms. The villas have high-end furnishings giving you the chance to relax in luxury. Each villa is spacious giving you the chance to get away and relax when needed. Guests have the choice of private or double rooms. The shared accommodation is gender-specific. You will find a king-sized bed, couch, television, and fireplace in private rooms. There is a lounge area separate from the private bedroom to relax in and get to know other residents. If you choose a private room option, you will have a large bathroom with shower and bathtub. Outside the villas are a swimming pool and hot tub. You can lounge around the patio area which overlooks the Malibu hills. A calming fountain is also found outside the property. This is the perfect area to sit, meditate, and relax. If you fancy a trip through nature, there is a hiking trail to explore. Meals are prepared by a private chef. The chef makes meals to each client's dietary needs with organic products. There is also a snack bar with tea, coffee, and healthy snacks clients can access throughout the day. Malibu Hills Treatment Center Malibu Hills Treatment Center is legally obligated to abide by Health Insurance Portability Accountability Act (HIPAA) of 1996, Public Law 104-191 laws and standards. The center makes every effort to ensure the privacy of clients' Personally Identifiable Information and Protected Health Information. Malibu Hills adheres to HIPAA standards and regional laws to protect your privacy. One of the world's best rehabs You will spend your rehab in the lap of luxury at Malibu Hills. The treatment program provides clients with individualized programs in one of the most beautiful locations in southern California. You will be spoilt for views and amenities at the rehab. You will experience holistic therapy to end your addiction and co-occurring disorders. Malibu Hills Treatment Center Modalities Malibu Hills provides clients with world-class treatment for alcohol and drug abuse along with co-occurring mental health disorders. Holistic therapies are provided to heal the client from the inside out. You will experience individual therapy twice a week and group therapy five times a week. There are also other therapies available including equine, art, mindfulness, cognitive behavior therapy, and dialectical behavioral therapy. Malibu Hills Treatment Center Setting As the name suggests, the rehab is set in the Malibu Hills near the Pacific Ocean. You will enjoy the beautiful outdoors of southern California during a stay at the rehab. The intensive luxury rehab gives you the chance to escape from the rigors of treatment to relax outside when possible. The rehab is also located near some of Malibu's best shopping. Malibu Hills Treatment Center Cost A 30-day stay at Malibu Hills Treatment Center costs $68,500. The rehab does accept major insurance providers including Blue Cross Blue Shield, Aetna, Multiplan, Anthem, Oxford Health Plan, Great West, and more. Malibu Hills Treatment Center Accommodation There are two, six-bedroom villas at Malibu Hills with space for up 12 guests at a time. Private and shared accommodation are available. Private rooms come with king-sized beds and private bathrooms with showers and bathtubs. Outside you will find a swimming pool and hot tub. An onsite chef prepares gourmet meals three times a day with organic ingredients. There is also a snack bar that can be accessed throughout the day. Rehabs in California https://www.worldsbest.rehab/rehabs-in-california/ Rehabs in Malibu https://www.worldsbest.rehab/rehabs-in-malibu-california/ Rehabs in South California https://www.worldsbest.rehab/rehabs-in-socal-california/ Hollywood Rehab https://www.worldsbest.rehab/hollywood-rehab/ Silicon Valley Rehab https://www.worldsbest.rehab/silicon-valley-rehab/ Other Rehabs in California Near Malibu Hills Treatment Center https://www.worldsbest.rehab/passages-ventura/ https://www.worldsbest.rehab/inspire-malibu/ https://www.worldsbest.rehab/malibu-hills-treatment-center/ https://www.worldsbest.rehab/avalon-malibu/ https://www.worldsbest.rehab/waismann-method-rapid-detox/ https://www.worldsbest.rehab/las-encinas-hospital/ https://www.worldsbest.rehab/wavelengths-recovery/ https://www.worldsbest.rehab/oro-house-recovery/ The Worlds Best Rehabs https://www.worldsbest.rehab/
Let's go to the moon!' ...is a great and lofty goal, but it doesn't mean much if you or I say it. Why? Because, just guessing, you don't have an actual plan for how to do that, or the means, for that matter. Point is, you need an actual plan, with real numbers and defined goals, and set time frames in order to achieve your goals. My guest this week, the CMO of GTMhub, Jeremy Epstein gets this and is passionate about the usefulness and importance of OKRs in the marketing department to help teams build plans to get them to where they want to go“Google is usually held up as the poster boy/girl/non-binary person for OKRs, because in the in the Bible of the OKR industry is what's called ‘measure what matters.' John Doerr introduced OKRs to Google. OKRs have this deep history going all the way back to Andy Grove at Intel, based on Peter Drucker. By my calculation, OKRs will be embedded in every successful organization in some form or format by the end of this decade. They are that game-changing capability-wise from a strategy execution perspective.” And changing up the game is exactly what Epstein is best at. In this show we'll get into some of the lessons Epstein learned during his time at Microsoft and Sprinkler, discuss some best practices for managing a remote workforce and unpack some key principles of great leadership in marketing. Don't worry, we've already invited him back on the show. I can't wait for you to enjoy this episode about the simplified and data-driven marketing methods of marketing guru, Jeremy Epstein.Main Takeaways:Evolving Leadership Process: A great leader is one who can take feedback and alter course to stay on the best track for the business. Becoming a leader will demand a new skill set and an ability to look at the bigger picture. Thinking about the work and the mission with a broader perspective will help you keep everyone moving in the right direction. The Role of OKRs in Business: Companies in the future will all use OKRs (Objectives and Key Results) to measure the success of their marketing campaigns. This method of precisely defining the goals and providing clear data is maximally effective. Setting forth a simple and easy-to-understand plan to accomplish a difficult mission is the first step to succeeding, and that's what an OKR does. Future of Blockchain in Marketing: The Apple cut-down on cookie use is just the beginning of the end of marketing with PII or Personally Identifiable Information. When more and more people get on and start using and trading in new markets, and for different purposes, you're going to need to find a way to reach the right people. ‘No more cookies,' is the way of the future. Document Processes: If any aspect of your business hinges upon one link in the chain, your whole business is at risk. Every role should be so well documented and laid that a new hire could come off the street with no prior knowledge of your business and be able to understand the job. Also, when you have everything written, there is a source of truth. Things get said in meetings and promptly forgotten. Documenting what was said in a meeting and immediately sharing that with the attendees can help move action items forward and create productive meetings. Key Quotes:“I got some really, candid feedback along the way from that my style for a lot of people was not working. It was too micromanage(y). It was too overbearing and people didn't like it. The best player doesn't always become your best coach. I needed to make that shift from player to coach. And I had to think about the game if you will, in a very different light. It's still a learning journey. And fortunately, I've had some great teachers along the way and most importantly, I tried to create an environment where my team feels safe and comfortable to tell me what a total screw-up I am on a regular basis.” “Marketing is all about differentiation. hat's the core, the single best book I've ever read about marketing is called ‘Different: Escaping the Competitive Herd Book by Youngme Moon'. It's about being different. My CEO at Gtmhub said it to me best when I came into the role he said, ‘You have to have infinite patience with people.' If you get 1% better every day, by the end of the year, you're going to be 97xs better.”“It's not about me being ‘the chief'. I almost reject that name. I'm the marketing enabler. I'm just trying to support everyone and make everyone better. I've asked almost everybody on my team, ‘what's your long-term career goal?' And I view it as my responsibility to help them get further.”“Google is usually is held up as the poster boy/girl/non-binary person for OKRs because in the Bible of the OKR industry is what's called measure what matters. John Doerr introduced OKRs to Google. OKRs have this deep history going all the way back to Andy Grove at Intel, based foundationally on Peter Drucker. So, yes, I have skin in the game but by my calculation, OKRs will be embedded in every successful organization in some form or format by the end of this decade, or else, those companies may not even be around. They are that game-changing capability-wise from a strategy execution perspective.” “I'm a maniac about documentation of processes on our confluence. I call it, ‘what if you get hit by a bus document.' If you get hit by a bus, Yes, I'll be sad but the business needs to continue. Someone else off the street [should be able to] come in and read your document [and] know how to do this person's role.” “In a web 3.0 world, you know nothing about your customer, aside from what their blockchain address is, what their wallet contents hold, and their transactions. There is no such thing as PII (Personally Identifiable Information.) This world already exists and you have to market to this world where that's all you know about the person. [This is] where we're going to end up anyway.”“How does the function and discipline and strategy around marketing evolve because of the arrival of this disruptive technology? There'll be expectations that customers co-create and co-own the brand with you. Why don't they have a stake in it when you have Bitcoin, you own one 21 millionth of the network. So why not own a part of the brand? And you could decentralize that and you can decent and you can co-create assets and, and not just give them a $2,000 award, but give them provable cocaine that represents 1% ownership in, you know, diet, Coke, vanilla cream, cherry pie, whatever kind of thing.”Bio:Jeremy Epstein is the CMO of Gtmhub. He has six years of corporate experience at Microsoft and has experienced high-growth marketing during his time as VP of Marketing at Sprinklr as they grew from a $20mm Series A valuation to a $1.8 billion level over 4 years.He has worked with top minds in blockchain, crypto-economics, smart contracts, and decentralization as an advisor to Open Bazaar, Zcash, DAOstack, SingularityNet, & Dapper Labs. He has keynoted Fortune 50 executive-level events on topics including social media, blockchain, and A.I. Jeremy shares his thoughts at blog.neverstopmarketing.com To learn more, click here: {{URL of detail page on found on www.mission.org}}---Marketing Trends podcast is brought to you by Salesforce. Discover marketing built on the world's number one CRM: Salesforce. Put your customer at the center of every interaction. Automate engagement with each customer. And build your marketing strategy around the entire customer journey. Salesforce. We bring marketing and engagement together. Learn more at salesforce.com/marketing.
Look around you, so many things that were once considered necessities such as answering machines, alarm clocks, maps, VHS tapes, CDs, and so much more have all been replaced by a smartphone or tablet.Digital advancements have dematerialized our world. The tools people need are no longer represented by physical belongings; they're now accessible through smart devices. Each person today is represented by individual pieces of data called PII or Personally Identifiable Information. In this episode, I'm going to break down PII even further and discuss some of today's digital targeting measures. Let's dive right in and figure it out together!
Does privacy still exist? In many ways, the answer is no. But efforts are being made across industries to instill respect for privacy. PII data, aka Personally Identifiable Information, is a hot topic, and a lot of innovation continues to focus on protecting this info. Register for this show to hear Host @eric_kavanagh interview: Colin Constable, The @ Company; and Ameesh Divatia, Baffle.
The third episode of Digital Tells: A BioCatch Podcast tackles the global epidemic of identity theft, and the resulting fraudulent accounts that ruin personal credit ratings, perpetuate mule activity and money laundering, and drain institutions of $Billions annually. Tom O'Malley joins us again to discuss why most account opening fraud occurs online. Raj Dasgupta from BioCatch, discusses the peculiar online behaviors exhibited by cybercriminals, versus those of genuine account applicants; The Digital Tells that help Behavioral Biometrics distinguish between criminal and genuine activity. Ayelet Biger-Levin discusses BioCatch's newly-announced Age Analysis Capability. And Howard Edelstein shares a story of account opening fraud detection that has become BioCatch lore. Tom O'Malley, a retired U.S. Department of Justice financial crimes prosecutor, founded a website, FrozenPII.org, which helps consumers protect their identity. Check it out!TranscriptHave you ever been the victim of identity theft? Ever applied for a loan or a credit card, only to find out someone else has masqueraded as you and negatively effected your credit standing? Identity theft and new account fraud is a global problem. If you live in the United States, chances are you've been a victim – and if not ~ it's likely someone close to you has been.I was chatting with Tom O'Malley, the former federal financial crimes prosecutor you met in Episode 2, and we were discussing identity theft. The U.S. federal trade commission reported recently that $3.3B was lost in 2020 due to identity theft – that's nearly double the $1.8B lost in 2019. And where are those stolen identities put to work? well, online of course – in the form of new accounts – credit card accounts, lines of credit, deposit accounts, you name it. Here's Tom O'MalleyTom O'MalleyMost often they're being opened remotely because it presents a little risk to the person who's opening an account. I mean, if you show a physically token something besides whatever documents you present, which are going to be fake driver's license, et cetera, you put yourself as a criminal at risk because there surveillance cameras. Nowadays, there's the ability to match surveillance footage with driver's license, facial recognition, driver's license. So typically criminals are not going to do this physically in a branch bank. They're going to do it remotely and they can do it remotely from anywhere in the world and depending on a bank's processes and fraud methods to detect fraud, it can be done from anywhere in the world, even though they're supposed to be a customer in the United States, opening up a bank account.This is interesting, unlike the scams and account take over stories that we discussed in earlier episodes – crimes that disproportionately target older folks – Identity Fraud victims are more likely to be young… like under 40. In fact, in 2019 of the 1.6 million identity fraud reports in the U.S. – 44% were from people between the ages of 20 and 29. According to Equifax Canada, nearly half of all suspected fraud applications are for those between 18 and 24. Ok – so – somebody gets ahold your personal information, enough to open a credit card account in your name. Maybe they obtained your personal info on the dark web – maybe it was originally stolen in some big corporate data breach. And then that info, your data, is applied to an online form to open an account. Oh, by the way – it might not be a credit account – it could be just a bank account, so instead of obtaining false credit in your name – is used for shuffling money between accounts – for scams – or mule activities – both issues we'll be taking a closer look at in later episodes. For this episode of digital tells, we're taking a close look at the act of opening fraudulent accounts. Which, for those of us who have been victims, happens silently in the background… Before that heart-in-your-throat moment when you realize your credit rating has been ruined… or perhaps even worse, you're contacted by law enforcement about scams or mule activities perpetrated in your name.Also – very important note here – your credit rating – or mine for that matter – isn't the only fall-out of identity theft. Financial institutions, credit issuers, they're the ones usually taking the hard financial losses. A study released earlier this year by Javelin Strategy & Research, reported that combined fraud losses climbed to $56 billion in 2020 globally. Of that, traditional identity fraud losses totaled $13 billion. Well, back to that initial account opening, in episode 2 we got a glimpse into the sophistication and scale of cybercrime syndicates…. Scale meaning LOTS of accounts and lots of victims. It's sendom just one account, rather it's usually hundreds or even thousands of accounts opened in each campaign. And therein lays an opportunity for institutions to differentiate between legitimate and fraudulent applications. The Digital Tells of fraudulent applications – if you will.Act 2My colleague Raj Dasgupta and I were recently talking about what typically happens during the act of applying for fraudulent accounts. Raj is the Director of Fraud strategy at BioCatch, and has two decades of experience in the trenches – dealing with identity fraud issues at organizations like TransUnion, HSBC, and Symantec, among others. OK, so before I go to Raj – for just a moment – think about what you do when you open an online account… maybe your taking advantage of a great credit card deal with lots of hotel rewards points. Then put yourself in the seat of one of these highly specialized cybercriminals we discussed in episode 2 – how would you go about your job of applying for multiple fraudulent accounts – hour after hour – all day long?OK – here's Raj - Raj DasguptaYeah, sure, I think copy pasting in online interaction can be on two different scenarios. One is account opening where you are copy pasting stolen information or made up information onto a form which is used for a new account opening. And it can be copy pasting the name, address or certain parts of the PII, quite likely from an application like an Excel sheet where you have all the stolen data. And within that copy pasting behavior. One is it's unusual for somebody applying for a new account to be copy pasting their own data. And the other is there can be copy paste and then erasing the pasted data, putting it in another form. As I was saying, it could be that the first name, last name are together in the Excel sheet. It's copied over to the first name field and then you cut the last name and place it in the last name for you. Very, very unusual scenarios or online behavior. Peter BeardmoreLet's transition to somebody actually reading this information. Right. So it's like long term memory versus short term memory. Can you can you talk about that a little bit?Raj DasguptaSo again, imagine in the context of account opening, you're typing in your name and address, Social Security number. You've been doing it for many, many years. It comes very fluently. You can type all the nine digits in at a steady cadence without stopping or without having to delete any digit and retype it in because you're essentially pulling it out of your long term memory and typing in the fraudster has stolen that information from somewhere else. That information does not belong to them. And they're either copy pasting the Social Security number or the name or address or typing it in. But because they're not familiar with that data, they'll make mistakes and they'll correct those mistakes. And then there type it again. Peter BeardmoreSo that behavior – cutting and pasting – the pace and pauses exhibited when entering personal information – those are just some of the Digital Tells that are the underlying indicators for behavioral biometrics to distinguish between genuine and fraudulent online account opening.In episode 2 we met Ayelet Biger-Levin, VP of Market Strategy at BioCatch. Later in the conversation we featured in episode 2, she went a little deeper into some of these indicators, and how BioCatch technology can make those distinctions.Ayelet Biger-LevinSome classic examples of the way that with this type of technology, we can distinguish between cyber criminal activity and genuine activity is by looking, by profiling the population and detecting differences between activities that correlate with fraud or correlate with genuine activity. So, for example, one thing that we observe when we track account opening activities is that there is a big difference between a cyber criminal and a legitimate actor and their familiarity with the process. A cyber criminal will be very, very familiar with the account opening process because they open many, many accounts every day. So they'll be very familiar with what are the mandatory fields. When you have a dropdown, they don't stop to select fields. They just go really quickly. They don't read the Ts and Cs, they won't select a credit card design. They'll just go very, very quickly and fill out the form, whereas the legitimate user will read the terms and conditions, will select their favorite credit card design, will think about their annual income, will select their interest rates and make decisions and selections. The process will be much longer. So that's one example. A second example is familiarity with data. A legitimate actor will be very, very familiar with their personal data. And when someone uses the data that they're familiar with, they will display use of their long term memory. So when they type, they will type continuously without pauses and they will, of course, know the data they might have Autofill, which is legitimate, and they'll enter the data fairly quickly. However, cyber criminals, when they need to enter personal data, they'll either copy or paste it from a list. They might type it because they try to memorize it. But we will see that they're using their short term memory and we'll see segmented typing along the way. They often have errors that they need to fix and they really display low familiarity with the data. It's interesting that some fields are actually not known to legitimate actors like think about part of the application process. You need to fill in a hotel rewards card. That's not something that number is not something that you have in hand. You probably have to log into your email, look for that number, whereas a cyber criminal who knows the process and wants to fill out that that number potentially will have that readily available. Hopefully at this point the idea is pretty clear by now – cybercriminals and legitimate applicants behave differently. Form formality. Short term and long term memory access. And obviously cut and paste and autofills can also make great indicators. BioCatch can leverage these Digital Tells to help organizations that rely on online applications for their business - protect themselves from fraud losses. And they also help and protect society – people like you and me – from being victimized by identity thieves and cybercrime syndicates. But wait, there's more. You may recall in episode 1 when I teased the idea that behavioral biometrics can actually guess your age. Not too long ago a BioCatch customer had an idea – if an application indicates the applicant is say 18 or 19 years old – or 75 or 85 years old for that matter – but the data is entered by someone say in their 40's… could we detect that? It turns out, to a degree of certainty – we can! Here's Ayelet again.Ayelet Biger-LevinWhen looking when analyzing the data and trying to find those correlations between ages and the use and the interaction. We found a shocking truth that for every year over 40, your keystrokes become slower. But specifically, there were nuances in things that we can look at, like shift to letter. So when you want to capitalize something, there are a few milliseconds added for every year over 40, and we could see a dramatic difference between someone in their 20s and someone in their 60s or 70s when conducting these activities. Another element is the use of a mobile device and the area in which users interact. So their swipe or the use of two thumbs versus a finger. A lot of indicators of age, very, very subtle things. But again, looking at the combination of those we're able to detect within five years, the age group that the user really belongs to.Act 3Alright, so, with all this technology to help differentiate between real and fraudulent account applications, you've got to figure that occasionally – some really interesting results follow. You're going to want to listen up to this story… it's a good one. If you're like me, you may have worked for a company or two in your career that has its own folk-lore. I've actually worked for 3 or 4 . You know those stories that everyone's heard – inside and outside the organization that make it fun to talk about. I once worked for a company whose founder “allegedly” ran over the car of a pizza delivery driver with his tank while the poor guy was carrying the pizza to the front door. That story still occasionally comes up in conversation – and I still can't confirm or deny it.Fortunately, BioCatch has no such infamous lore – but the story you're about to hear I heard more than a few times. And this one I can not only confirm is TRUE, but it helps to make another really important point about the value of detecting accounting opening fraud using behavioral biometrics.In episode 1 you met Howard Edelstein, BioCatch's chairman . In a second here I'm going to drop you into more of the conversation he and I had. In this part he was talking about winning the business of a major financial services company and the early stages of their work with BioCatch. Here's Howard.Howard EdelsteinAnd the story in point was we identified this is a particular case that came out of an analysis while where they were becoming a client, a particular case where someone was applying for a credit card. We thought it was perfectly legit. They filled out the entire application. And anyone who filled out the application that way had to be OK. Well, the credit card company turned down the application and they turned it down because they told us it was fraudulent. And we said, OK. And we went back. And you were always trying to figure out, you know, if the model works and the AI is humming along and the data science team came back and said, listen, you know this. We looked at the data. This can't be a fraudulent applications the guy really knew what he was entering. And the credit card company said, you know, we don't want to piss you guys off or anything, but just want to tell you it really is fraud. And we went back and forth a few times and we said, well, how do you know that? And they said, it's really simple. The guy's dead. Well, that's one of those New York binary kind of answers, right? Dead not dead, you know? Well, our data science team doesn't exactly take that at face value. They said, I think we better call them and tell them the guy's not dead. And everyone kind of looked at each other and said, you got to be effing kidding. Really? What am I going to do with this gem of a piece of information? Right. Because in the end of the day, it turned out they actually called the guy for the reported the guy. And someone answered the phone purporting to be to the dead guy who was applying for a credit card. And one thing led to another, and it turned out that, believe it or not, the guy was far from dead. And this was determined through the use of behavior. So it's a really simple explanation, quite frankly. But the explanation was that someone, a legitimate person entering a legitimate information for legitimate credit card application mistyped a digit of his Social Security number in the U.S. that social corresponded to a social of someone who was deceased. The byproduct, well, that was actually decreasing false declines and increasing number of credit cards to give out, which also was a real revenue opportunity for them. So it's a win win win situation and behavior had never been used this way before.Peter BeardmoreSo this is a great story – which raises a few important points – none of which pertain to BioCatch resurrecting the dead.But it's important to understand, as we mentioned previously, that behavioral biometrics isn't the only fraud detection technology out there. There are others. But none are infallible. And some may introduce friction (like asking life questions or imposing other obstacles) that prospects potentially just don't want to deal with. And business spend lots (and lots) of money on marketing and customer acquisition… for organizations to lose a potential customer at the very point of filing out an account application / only because the anti-fraud tech is too cumbersome – or they accidently mistyped something – well – that's just heartbreaking for marketers like me.In episode 6 we'll talk about the return on investment (or ROI) of behavioral biometrics. But suffice, it's not just about stopping fraud. It's at least equally about winning and retaining good customers. By reducing friction – and making for a great customer experience. Digital Tells is written and narrated by me Peter Beardmore, in partnership with my producer Doug Stevens of Creative Audio and Music, and with the unwavering support and sponsorship of my employer, BioCatch.Special thanks to Ray Dasjupta, Ayelet Biger-Levin, and Howard Edelstein. We once again opened our episode with Tom O'Malley. Since Tom retired from the US Department of Justice, he's started a website called FrozenPII.org. Pie is spelled PII (as in Personally Identifiable Information). The site helps consumers protect their identity. You can find a link in our show notes, check it out!For more information about this episode, behavioral biometrics, or to share a comment or idea, visit biocatch.com/podcast.Join us for episode 4, in which we'll explore Scams. Did you know your car warrantee is about to expire? More importantly, what can be done to help detect when someone is about to be victimized by a scammer?Until then, take care.
Modern cybercrimes are responsible for $400B dollars of losses on an annual basis. Headlines appear regularly announcing major breaches. Yet few people and businesses understand what happened in such incidents and how to avoid being a victim themselves. The security industry does provide analyses of breach statistics, but effective preventative measures can be lost in the numbers. Virtually all breaches result from technology failure combined with people failure.This presentation will look at actual recent cybercrimes in order to document what happened and what could have prevented that incident. Who carried out the breach? What did they do? What was taken? How could it have been stopped? What was the story behind the breach? Attack types include ransomware, business email compromise, intellectual property theft and breach of Personally Identifiable Information. By being more familiar with current successful threats and breaches you will:· Be able to avoid high risk activities, if possible· Be able to be better prepared to stop such an attack against you or your organization· Be able to optimize security spending and resources for actual attack patternsThis presentation is designed for both security professionals and business professionals who want to better secure their assets and processes against the increasing number of cyber criminals. About the speaker: Frederick W.Scholl is an accomplished global information security risk manager with a unique record of accomplishment in business and technology. He is one of the few people in the cybersecurity industry with business experience from start-up to board member, and security experience from practitioner to manager. He is now Cybersecurity Program Manager and Associate Teaching Professor at Quinnipiac University. He started the online Cybersecurity Master's degree program there in 2018. Dr. Scholl earned a BS and Ph.D. in Electrical Engineering from Cornell University. He completed an Internet Law Program from Harvard and holds CISM, CISSP, ITIL and CHP security certifications. He is listed in 2020 "Who's Who in America".
As more Personally Identifiable Information is collected, stored or created, the specter of customer privacy issues are looming large. Privacy and Security methodologies are starting to be dictated by those in State houses, Congress and Supra-regional governments. Enterprises need to take a long hard look at the information they are capturing and how they secure it to determine whether the potential value outweighs the potential risk. - How do your current Security and Privacy practices match up against upcoming laws in Europe, US other parts of the world? - Are you prepared to deal with new laws with huge fines? What about Private Right of Action?- Are you anticipating what is coming down the road? Takeaways:- Understand the implications of new laws are as well as your risks- Understand how to comply with upcoming laws- Understand how contracts and data flow will be impacted- Ways to drive your organization to implement- How can this be beneficial for you personally About the speaker: Leon Ravenna, CISO - KAR Auction Services - Leon has over 30 years' experience in Healthcare, Financial Services and Technology companies. He leads Global Security Strategy, Execution, Privacy and Compliance services.Leon is currently CISO of a $2.5B multi-national company in the auto auction and financial services space. Providing Security, Privacy & Compliance expertise for over 15,000 employees. Leon has led nationwide support, Web & CRM development efforts, data center builds, heavy infrastructure for SaaS companies in the medical and financial space.Leon has extensive experience in Regulatory, Compliance & Privacy having managed ISO27001, HIPAA, SSAE-16, PCI and NIST system builds and audits. In addition to holding a PMP. Leon holds a CISSP and PMP and is one of a very small group world-wide to hold 6 major Global Privacy certifications including CIPM, CIPP/ C and CIPP/ E, CIPP/ G, CIPP/ US and FIP.
As more Personally Identifiable Information is collected, stored or created, the specter of customer privacy issues are looming large. Privacy and Security methodologies are starting to be dictated by those in State houses, Congress and Supra-regional governments. Enterprises need to take a long hard look at the information they are capturing and how they secure it to determine whether the potential value outweighs the potential risk. - How do your current Security and Privacy practices match up against upcoming laws in Europe, US other parts of the world? - Are you prepared to deal with new laws with huge fines? What about Private Right of Action? - Are you anticipating what is coming down the road? Takeaways: - Understand the implications of new laws are as well as your risks - Understand how to comply with upcoming laws - Understand how contracts and data flow will be impacted - Ways to drive your organization to implement - How can this be beneficial for you personally
Computer Talk Radio Broadcast 11-23-2019: News of BMW, CarPlay, ToysRUs, Google; Semi-Annual Computer Purchasing Guide; Apple migrations; Q about PC on all day; hackers; systems integration; car LED headlamps; Personally Identifiable Information; storage
Computer Talk Radio Broadcast 11-23-2019: News of BMW, CarPlay, ToysRUs, Google; Semi-Annual Computer Purchasing Guide; Apple migrations; Q about PC on all day; hackers; systems integration; car LED headlamps; Personally Identifiable Information; storage
In today's Federal Newscast, the Veterans Benefits Administration, under pressure, reverses an Obama-era policy that resulted in Privacy Act violations.
We hear the term PII quite a bit. Personally Identifiable Information is at the center of the privacy discussion but what is it? This epsiode talks about the challenges of defining what PII is. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't forget to subscribe to the Security In Five Newsletter. —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,
President Dad is back! Everyone is having fun for Jerry's birthday until, uh oh, Chad gets mixed up and schedules the Presidential parade at his suburban home and has a cake sent with Jerry's real name and other Personally Identifiable Information sent to The White House. Will they be able to stop the parade, tanks and all, from rolling into suburbia? What flavor is that wedding cake? Will Albin's new idea for an engine that runs on GARBAGE destabilize the economy? Tune in to find out!
Personally Identifiable Information or PII can be dangerous in the wrong hands. Phishing, identity theft, and cyber extortion are just some of the threats. But how much do you think about data security when using chauffeuring services like Uber? Join us in this podcast to find out about the policies for data retention and the security issues that affect you directly, and your rights regarding data deletion. With our panel of experts, we pick the Uber privacy case apart. And put it back together with handy tips about how you can better safeguard your personal data. Get the details here!
One of the most hotly contested subjects when negotiating telecom and IT master agreements is a service provider’s obligations to protect its customer’s data, particularly highly sensitive data like Personally Identifiable Information, or “PII.” Stakes are high, as seen by the Equifax breach or the SONY hack, so these issues are particularly challenging for both providers and customers. Listen to this 12 minute podcast as Kevin DiLallo, a Senior Partner at LB3, and Sara Crifasi, an LB3 Associate, discuss with TC2’s Joe Schmidt the importance of understanding what an enterprise really needs, what risks its data is facing, and what a reasonable and fair allocation of responsibility to the service provider would be.
This week on the I Love Data Centers podcast, we interview Mark Del Bianco, an attorney who represents direct sales agents and services providers in the data center industry, with experience in how drones are used for data collection. In this podcast, Del Bianco and I discuss the EU’s GDPR, its impact on EU and American citizens, and some laws being created in the U.S. that cover Personally Identifiable Information or PII. This is an excellent chance to gain some insight on drone technology as applicable to data collection/storage and what you need to know about new laws being created that deal with how you manage PII. I believe you are sure to enjoy this one! Show Notes: 1:12 Mark Del Bianco 2:09 What Mark does 3:56 Drones 5:53 Mark’s upbringing 13:36 Advice Mark wish he had when he started his practice 14:46 Successful marketing techniques that Mark used 20:47 What is GDPR? 23:29 How will GDPR be enforced? 26:12 What purpose did the GDPR serve? 27:33 What sort of data are they concerned about protecting? 34:39 Companies affected by GDPR 37:07 Effect on EU/American citizens 38:59 Do US based data center providers have to worry about falling under GDPR regulations? 45:45 How is the EU able to pass laws that would affect EU citizens in America? 48:05 Are there any existing precedence to this? 50:45 California data privacy laws 54:09 What will happen to those who don’t comply? 59:05 The “Right To Be Forgotten” 1:01:26 Does GDPR mean that individual state government agencies must also be compliant? 1:06:57 Data base engineers in the process of becoming compliant 1:09:26 What steps does a company need to take in order to become compliant? 1:13:30 What is a piece of technology you’ve seen recently that’s blown your mind? 1:17:19 What is a common misconception about your industry? 1:21:14 The most influential piece of advice Mark received at the start of his career? 1:25:50 Mark’s first time in a data center 1:27:24 How to get in contact with Mark Links mentioned http://www.markdelbianco.com/
Personally Identifiable Information is the gateway to identity theft. We hear about companies losing control of PII but there are also things individuals can do to cause identity theft as well. This episode goes into the tips and pitfalls you could be doing today that will expose you to identity theft. Be aware, be safe. ------------------------------------ Website - https://www.binaryblogger.com Podcast Page - http://securityinfive.libsyn.com Podcast RSS - http://securityinfive.libsyn.com/rss Twitter @binaryblogger - https://www.twitter.com/binaryblogger iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2 YouTube - https://www.youtube.com/binaryblogger TuneIn Radio - Security In Five Channel Spotify - Security In Five Podcast Page Email - contactme@binaryblogger.com
TechLaw10 hosts Jonathan Armstrong and Eric Sinrod discuss legal issues related to information technology. In this episode, Jonathan and Eric give tips for Internet users to keep their private information from being misused online.
Personally Identifiable Information (PII) is one of the most central concepts in information privacy regulation, but there is no uniform definition of it. Moreover, the US and European Union approach this topic in different ways. Computer science has shown that PII and non-PII are not immutable categories. Hear Professors Paul Schwartz (Berkeley Center for Law & Technology) and Daniel Solove (GW Law) present their new paper “The PII Problem,” which discusses personally identifiable information and proposes a concept entitled "PII 2.0." A panel discussion moderated by Jules Cohen with Chris Calabrese, D. Reed Freeman, Jr and Maneesha Mithal follows.